Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ipsec__plutorun: Starting Pluto subsystem...
- pluto[2724]: Starting Pluto (Openswan Version 2.6.37; Vendor ID OEu\134d\134jy\134\134ap) pid:2724
- pluto[2724]: LEAK_DETECTIVE support [disabled]
- pluto[2724]: OCF support for IKE [disabled]
- pluto[2724]: SAref support [disabled]: Protocol not available
- pluto[2724]: SAbind support [disabled]: Protocol not available
- pluto[2724]: NSS support [disabled]
- pluto[2724]: HAVE_STATSD notification support not compiled in
- pluto[2724]: Setting NAT-Traversal port-4500 floating to on
- pluto[2724]: port floating activation criteria nat_t=1/port_float=1
- pluto[2724]: NAT-Traversal support [enabled]
- pluto[2724]: using /dev/urandom as source of random entropy
- pluto[2724]: ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
- pluto[2724]: starting up 1 cryptographic helpers
- pluto[2724]: started helper pid=2731 (fd:6)
- pluto[2731]: using /dev/urandom as source of random entropy
- pluto[2724]: Using Linux 2.6 IPsec interface code on 3.18.14+ (experimental code)
- pluto[2724]: ike_alg_register_enc(): Activating aes_ccm_8: Ok (ret=0)
- pluto[2724]: ike_alg_add(): ERROR: Algorithm already exists
- pluto[2724]: ike_alg_register_enc(): Activating aes_ccm_12: FAILED (ret=-17)
- pluto[2724]: ike_alg_add(): ERROR: Algorithm already exists
- pluto[2724]: ike_alg_register_enc(): Activating aes_ccm_16: FAILED (ret=-17)
- pluto[2724]: ike_alg_add(): ERROR: Algorithm already exists
- pluto[2724]: ike_alg_register_enc(): Activating aes_gcm_8: FAILED (ret=-17)
- pluto[2724]: ike_alg_add(): ERROR: Algorithm already exists
- pluto[2724]: ike_alg_register_enc(): Activating aes_gcm_12: FAILED (ret=-17)
- pluto[2724]: ike_alg_add(): ERROR: Algorithm already exists
- pluto[2724]: ike_alg_register_enc(): Activating aes_gcm_16: FAILED (ret=-17)
- pluto[2724]: Changed path to directory '/etc/ipsec.d/cacerts'
- pluto[2724]: Changed path to directory '/etc/ipsec.d/aacerts'
- pluto[2724]: Changed path to directory '/etc/ipsec.d/ocspcerts'
- pluto[2724]: Changing to directory '/etc/ipsec.d/crls'
- pluto[2724]: Warning: empty directory
- pluto[2724]: added connection description "L2TP-PSK-NAT"
- pluto[2724]: added connection description "L2TP-PSK-noNAT"
- pluto[2724]: listening for IKE messages
- pluto[2724]: adding interface eth0/eth0 172.16.0.2:500
- pluto[2724]: adding interface eth0/eth0 172.16.0.2:4500
- pluto[2724]: adding interface lo/lo 127.0.0.1:500
- pluto[2724]: adding interface lo/lo 127.0.0.1:4500
- pluto[2724]: adding interface eth0/eth0 2601:648:8503:91aa:ba27:ebff:fe81:2735:500
- pluto[2724]: adding interface lo/lo ::1:500
- pluto[2724]: loading secrets from "/etc/ipsec.secrets"
- pluto[2724]: loading secrets from "/var/lib/openswan/ipsec.secrets.inc"
- pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [RFC 3947] method set to=109
- pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
- pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
- pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
- pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
- pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
- pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
- pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 110
- pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 110
- pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 110
- pluto[2724]: packet from 73.134.56.18:500: ignoring Vendor ID payload [FRAGMENTATION 80000000]
- pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [Dead Peer Detection]
- pluto[2724]: packet from 73.134.56.18:500: initial Main Mode message received on 172.16.0.2:500 but no connection has been authorized with policy=PSK
- pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [RFC 3947] method set to=109
- pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
- pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
- pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
- pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
- pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
- pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
- pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 110
- pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 110
- pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 110
- pluto[2724]: packet from 73.134.56.18:500: ignoring Vendor ID payload [FRAGMENTATION 80000000]
- pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [Dead Peer Detection]
- pluto[2724]: packet from 73.134.56.18:500: initial Main Mode message received on 172.16.0.2:500 but no connection has been authorized with policy=PSK
- pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [RFC 3947] method set to=109
- pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
- pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
- pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
- pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
- pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
- pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
- pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 110
- pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 110
- pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 110
- pluto[2724]: packet from 73.134.56.18:500: ignoring Vendor ID payload [FRAGMENTATION 80000000]
- pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [Dead Peer Detection]
- pluto[2724]: packet from 73.134.56.18:500: initial Main Mode message received on 172.16.0.2:500 but no connection has been authorized with policy=PSK
- pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [RFC 3947] method set to=109
- pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
- pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
- pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
- pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
- pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
- pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
- pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 110
- pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 110
- pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 110
- pluto[2724]: packet from 73.134.56.18:500: ignoring Vendor ID payload [FRAGMENTATION 80000000]
- pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [Dead Peer Detection]
- pluto[2724]: packet from 73.134.56.18:500: initial Main Mode message received on 172.16.0.2:500 but no connection has been authorized with policy=PSK
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement